1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
8

One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o

r outsourcing software for information systems projects. What are the advantages of purchasing commercial off-the-shelf (COTS) software?
Computers and Technology
1 answer:
Mademuasel [1]3 years ago
3 0

Answer:

Explanation:

There are different advantages to buy commercial software like:

- Is a system used for other companies, we will have good referents with the feedback of them.

- Support, we should have support twenty-four hours, if a system doesn't have good support, we must not buy the software.

- We can choose software with a lower initial cost, this depends on our needs.

You might be interested in
.____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
padilas [110]

Answer: Brand

Explanation:

A brand is a way to identify and differentiated the good and services as, brand is the process, which is used for the business and the marketing strategies. Basically, it is used as communication method for distinguished the products and the company for creating the good impression for customers. Brand awareness and management is the main key components.  

3 0
4 years ago
This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Con
puteri [66]

Answer:

Explanation:

Solution

a)

The "bit" is just leaving "Host A"

b)

The 1st bit is in the link and has not reached "Host B"

c)

The 1st bit has reached "Host B"

6 0
4 years ago
16. When the speed limit is not posted, the default
Elanso [62]

Answer:

C. 55, 30

Explanation:

Even though each state in the United States has different speed limits. However, in a situation whereby the speed limit is not posted, the default speed limit recommends that drivers maintain a speed of "55" mph on the highway and "30" mph in the city.

The highest speed limit in the United States is 85mph on a rural highway in Texas while the lowest generally for the country is 30mph in a residential area.

3 0
3 years ago
HEEEEELPPP!!!BRAINLIEST!!! THIS IS URGENT!!!
Fittoniya [83]

Answer:

Begin the statement with the proper keyword to start the loop

Explanation:

Given

The code segment

Required

Fix the code

The first line of the code segment is meant to be a for loop, but it does follow the right syntax.

This is so because the for keyword is missing.

The first line should be corrected and replaced with:

for count in range(80):

Hence, option (b) is correct

4 0
3 years ago
Which attack intercepts communications between a web browser and the underlying computer?
Vlad [161]

The question has the below multiple choices

A. Man-In-The-Middle (MITM)
B. Man-In-The-Browser (MITB)
C. Replay
D. ARP poisoning

The answer is B

As compared to the Man-In-The-Middle attack, the Man-In-The-Browser attack intercepts communications between parties to manipulate or steal data. This attack seeks to intercept and steal or manipulate communication that exists between the browser and the underlying computer. It begins with a Trojan infecting the underlying computer and installing an extension into the web browser configuration.







6 0
3 years ago
Other questions:
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action?
    15·1 answer
  • The LTE (cellular telephone) standard supports only packet switching"". What cellular services are morst affected by this change
    15·1 answer
  • Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
    15·2 answers
  • Instructions: Type the correct answer in the box. Spell the word correctly.
    5·2 answers
  • The audience for your security assessment report (SAR) is the leadership of your company, which is made up of technical and nont
    6·1 answer
  • What is the clearing house for domain names called?
    12·1 answer
  • The first generation of computers used vaccum tubes .Why were they replaced by the transistors​
    10·2 answers
  • How do motion sensors determine in simation
    13·1 answer
  • What was the in-app phrase listed as SC answer? <br> A) MasterCard <br> B) No fee<br> C) Apple Pay
    15·2 answers
  • Can I control my digital footprint?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!